EU Nations Expand Their Cyber Defences

More European countries have been widening the scope of their cyber defence operations. Finland has rolled out significant legislative and intelligence facility funding proposals meant to strengthen national security and cyber-defence infrastructure.

One major initiative includes the establishment in Helsinki of the NATO-supported European Centre of Excellence for Countering Hybrid Threats, or ECE-CHT.

On the legislative side, Finland’s military and national security agencies will receive more expansive powers to conduct intelligence gathering inside and outside Finland’s borders.

The initiatives take place as Nordic national and military intelligence agencies issue fresh warnings regarding a potential escalation in cyber-attacks, mainly from Russian sources, that could target their critical government, defense and national security IT platforms.

Apart from Finland, the countries backing ECE-CHT include France, Germany, Latvia, Lithuania, Poland, Sweden and Britain. Other states are expected to join the ECE-CHT, which is due to be open in the second half of 2017.

The center will provide NATO with an additional counter-hybrid strategy resource. Other centers of excellence that already contribute to NATO’s efforts to counter hybrid threats are operating in Riga, Latvia, and Tallinn, Estonia.

The enhancement of surveillance powers for the military and national security agencies is fronted by legislative bills advanced by the ministries of Defence, Justice and the Interior. Finland’s national security agency, SUPO, will be able to gather and process technically based intelligence from cross-border network traffic for the first time.

The powers currently available to Finland’s military intelligence are being expanded to bolster the country’s defence capabilities. These will give the armed forces greater legal authority to conduct human, signals, information system and telecommunications intelligence operations, said Hanna Nordström, the ministerial working group’s chairperson.

“One objective of strengthened security operations would be to obtain information on relevant foreign military behavior and intelligence activities, and activities that pose a threat to public order, the development and distribution of military materials, and international crises,” Nordström said.

I-HLS: 

You Might Also Read:

Global C4ISR Has A Cyber Warfare Surge:

How A Cyber Attack Transformed Estonia:

Warning Over Russia's Cyber Warfare Methods:

 

« Police Innovative Reporting Technology
Cybersecurity Has A Serious Talent Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Singularico

Singularico

Singularico help secure your software using the power of AI.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.